[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:1500834
An integer overflow flaw was found in the way the Linux kernel's Advanced Linux Sound Architecture (ALSA) implementation handled user controls. A local, privileged user could use this flaw to crash the system.

oval:org.secpod.oval:def:21803
The host is installed with Linux kernel before 3.14.6 and is prone to a information disclosure vulnerability. A flaw is present in the application, which does not initialize a certain data structure. Successful exploitation allows local users to obtain sensitive information from kernel memory.

oval:org.secpod.oval:def:1500815
A flaw was found in the way the Linux kernel's Stream Control Transmission Protocol (SCTP) implementation handled duplicate Address Configuration Change Chunks (ASCONF). A remote attacker could use either of these flaws to crash the system.

oval:org.secpod.oval:def:702124
linux-lts-quantal: Linux hardware enablement kernel from Quantal Several security issues were fixed in the kernel.

oval:org.secpod.oval:def:702088
linux: Linux kernel Several security issues were fixed in the kernel.

oval:org.secpod.oval:def:702121
linux-lts-raring: Linux hardware enablement kernel from Raring Several security issues were fixed in the kernel.

oval:org.secpod.oval:def:501464
* A flaw was found in the way the Linux kernel"s SCTP implementation handled malformed or duplicate Address Configuration Change Chunks . A remote attacker could use either of these flaws to crash the system. * A flaw was found in the way the Linux kernel"s SCTP implementation handled the associati ...

oval:org.secpod.oval:def:203505
* A flaw was found in the way the Linux kernel"s SCTP implementation handled malformed or duplicate Address Configuration Change Chunks . A remote attacker could use either of these flaws to crash the system. * A flaw was found in the way the Linux kernel"s SCTP implementation handled the associati ...

oval:org.secpod.oval:def:702127
linux: Linux kernel Several security issues were fixed in the kernel.

oval:org.secpod.oval:def:702097
linux-ti-omap4: Linux kernel for OMAP4 Several security issues were fixed in the kernel.

oval:org.secpod.oval:def:1500825
An out-of-bounds write flaw was found in the way the Apple Magic Mouse/Trackpad multi-touch driver handled Human Interface Device (HID) reports with an invalid size. An attacker with physical access to the system could use this flaw to crash the system or, potentially, escalate their privileges on t ...

oval:org.secpod.oval:def:702110
linux-lts-trusty: Block storage devices Several security issues were fixed in the kernel.

oval:org.secpod.oval:def:52261
linux: Linux kernel Several security issues were fixed in the kernel.

oval:org.secpod.oval:def:702093
linux: Linux kernel Several security issues were fixed in the kernel.

oval:org.secpod.oval:def:702091
linux-lts-saucy: Linux hardware enablement kernel from Saucy Several security issues were fixed in the kernel.

oval:org.secpod.oval:def:1500870
A flaw was found in the way the Linux kernel's Stream Control Transmission Protocol (SCTP) implementation handled duplicate Address Configuration Change Chunks (ASCONF). A remote attacker could use either of these flaws to crash the system.

oval:org.secpod.oval:def:1500852
Updated kernel packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System base scores, which give detailed severity ratings, are ...

oval:org.secpod.oval:def:1600039
The media_device_enum_entities function in drivers/media/media-device.c in the Linux kernel before 3.14.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioct ...

CPE    3
cpe:/o:canonical:ubuntu_linux:12.04::~~esm~~~
cpe:/o:linux:linux_kernel
cpe:/o:canonical:ubuntu_linux:13.10
CWE    1
CWE-200
*CVE
CVE-2014-1739

© SecPod Technologies